WO2018005976A1 - Accès programmé à une propriété de location temporaire - Google Patents
Accès programmé à une propriété de location temporaire Download PDFInfo
- Publication number
- WO2018005976A1 WO2018005976A1 PCT/US2017/040304 US2017040304W WO2018005976A1 WO 2018005976 A1 WO2018005976 A1 WO 2018005976A1 US 2017040304 W US2017040304 W US 2017040304W WO 2018005976 A1 WO2018005976 A1 WO 2018005976A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- property
- user
- access credential
- credential
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
- H04W12/64—Location-dependent; Proximity-dependent using geofenced areas
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
- G07C9/00904—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like
Definitions
- This disclosure application relates generally to rental property management technology.
- Properties are often temporarily available for rent to a user by a property owner.
- a property owner may provide a rental property listing to advertise the property to users. Once a user expresses interest in renting an available property, the property owner and the user attempt to reach an agreement on allowing the user temporary physical access to the rental property.
- Techniques are described for rental property management technology. For example, techniques are described to generate and distribute access credentials to users such as temporasy guests or occupants that access a rental property for a limited time period. Users can be provided with access to the rental property through an application or webpage portal without creating a new user account or user login for the application. For example, a user can be granted access through an application or web portal to control electronic de vices associated with a monitoring system of a rental property without creating a new user account with the monitoring system. Techniques described herein enable such users to more easily access, for example, rental property information through an application or through a webpage postal that is associated with a monitoring system of the rental property.
- access credentials can be distributed to users through any suitable means, e.g., through email or SMS, and used to temporarily authenticate users without requiring that the user create a user account that enables access to the rental property.
- the access credentials may be generated and distributed to users at various stages of the property rental process, in some instances, the access credential is generated after a user submits a reservation for a rental listing provided by a property administrator. In such instances, the generated access credential is initially associated with the reservation, and then distributed to the user to provide access to an application (or a webpage) to view rental property information.
- the access credential is pre- generated by the system once a property administrator creates the rental listing prior to any user submitting a reservation request. In such instances, the access credential is assigned and distributed to a user once she/she submits a rental reservation.
- the access credential may be used for a variety of functions that are related to property rental.
- the access credential can be used to provide easy access to property information without requiring the user to create a new account to access an application that is capable of exchanging communications with a monitoring system of the rental property.
- the distributed access credential is used to authenticate the user into the application so that he/she can perform actions related to the rental property such as physically accessing the rental property or controlling electronic devices located within the property.
- user information is obtained from an external source (e.g., an existing user account associated with a rental property listing website or a rental property listing application) and associated with the distributed access credential.
- an external source e.g., an existing user account associated with a rental property listing website or a rental property listing application
- the user information can be additionally used to authenticate the user into the application.
- the user can use the application to perform actions associated with the rental property.
- actions can include transmitting messages to the property administrator, using the application to unlock an electronic lock of the rental property to provide physical access, controlling smart appliances and/or network-enabled devices through commands transmitted from the application, among others.
- the system may generate and provide the access credential in response to receiving an indication that the property administrator has approved the user to rent the corresponding property.
- the granted access credential can also be used to control the provisioning of services that are associated with the property rental to the user.
- implementations of the described techniques may include hardware, a method or process implemented at least partially in hardware, or a computer-readable storage medium encoded with executable instructions that, when executed by a processor, perform operations.
- FIG. 1 is a schematic diagram that illustrates an example of a system that enables temporary rental property access.
- FIG. 2-3 are flowcharts that illustrate examples of processes relating to temporary rental property access.
- FIG. 4 is a schematic diagram that illustrates an example of a rental property with multiple access regions.
- FIGS. 5A-5B are schematic diagrams that illustrate examples of user interfaces for an application that is used by a property administrator.
- FIGS. 6A-6B are schematic diagrams that illustrate examples of user interfaces for an application that is used by a user.
- FIG. 7 is a flowchart that illustrates an example of a process for providing temporary access to a property.
- Each access credential may be associated with a particular rental property and associated with a set of access conditions that are specified by a property administrator.
- the access credentials may be generated and distributed to users at various stages of the property rental process.
- the access credential is generated after a user submits a reservation for a rental listing provided by a property administrator.
- the generated access credential is initially associated with the reservation, and then distributed to the user to provide access to an application (or a webpage) to view rental property information.
- the access credential is pre- generated by the system once a property administrator creates the rental listing prior to any user submitting a reservation request. In such instances, the access credential is assigned and distributed to a user once she/she submits a rental reservation.
- the access credential may be used for a variety of functions that are related to property rental.
- the access credential can be used to provide easy access to property information without requiring the user to create a new account to access an application that is capable of exchanging communications with a monitoring system of the rental property.
- the distributed access credential is used to autlienticate the user into the application so that he/she can perform actions related to the rental property such as physically accessing the rental property or controlling electronic devices located within the property.
- user information is obtained from an external source (e.g., an existing user account associated with a rental property listing website or a rental property listing application) and associated with the distributed access credential.
- an external source e.g., an existing user account associated with a rental property listing website or a rental property listing application
- the user information can be additionally used to authenticate the user into the application.
- a "property administrator” refers to an individual or an entity that controls access to a rental property.
- a property administrator may be a property owner that retains property title to the property to be rented.
- the property administrator may be an authorized agent of the property owner that manages and rents the property on behalf of the property owner.
- the property administrator specifies a set of access conditions that are associated with the rental of a property. For example, the property administrator may specify the cost of rental, time periods of availability, or services that are offered along with the property' rental.
- a "user” refers to an individual that requests to rent a property that is made available by the property administrator.
- the user can submit a rental requests through various mediums such as sending a direct email to the property
- An "access credential” refers to a credential that is associated with a rental property and provides one or more prospective users with temporary access to the rental property with permission from a property administrator.
- an access credential is initially generated for a rental property, property information and one or more access conditions that are specified by the property administrator are also associated with the access credential.
- the access credential can be provided to the user to enable access to rental property services through a separate application without requiring user account, creation and/or information submission for the application, in this regard, once a rental agreement has been entered into between a property administrator and a user, the access credential may then be assigned to the user to allow for provisioning of various rental services.
- the access credential can be a uniquely generated personal identifier number (PIN) with a specified number of alphanumeric characters.
- Access credential activation refers to a process where a user enters a distributed access credential into a login screen of an application, or some other type of interface, to view and access information related to property rental .
- the distributed access credential becomes activated once a user enters the access credential into an entry form displayed an application.
- the user may then view pertinent information associated with the rental property, and/or transmit instructions to devices associated with the rental property to perform particular actions as described in more detail below.
- an access credential may become inactive in certain situations.
- an access credential may be associated with an access condition that specifies a fixed time period in which the access credential remains valid.
- the access credential may only be activated within the fixed time period, and becomes inactive after expiration of the fixed time period.
- an access credential may be inactivated after one or more events specified by the property administrator. For instance, different access credentials may be distributed to different users who have each submitted rental reservations for the same property. In this instance, each respective access credential may be active until one user forms a rental agreement with the property administrator, which then causes the other access credentials to become invalid because the rental property is no longer available for rent.
- Access credential enablement refers to a process by which a distributed access credential is used by a prospective user to physically access the rental property after forming a rental agreement with the property administrator. For instance, in some instances, after a user has activated the access credential by logging into the application, the user may then use the application to transmit an instruction to unlock a front door of the rental property when he/she initially arrives at the property.
- the access credential becomes enabled once the user performs actions that indicate that he/she has obtained possession over the rental property
- an access credential may be activated but disabled after the user forms a rental agreement but prior to the start of the specified rental period, whereas an access credential may be activated and enabled once the user actually obtains possession over the rental property to initiate the rental period.
- an enabled access credential allows the user to perform a greater number of actions on the application compared to an activated (but not enabled) access credential. For instance, because an enabled access credential indicates that, the user has physically obtained possession over the rental property, once an access credential is enabled, the application may present the user with options to transmit instructions to connected devices and/or appliances within the property to perform certain actions. Examples of actions may include unlocking an electronic lock of the property, operating smart appliances within the property, among others.
- Access conditions refer to features, attributes, or limitations of the property rental that are associated with the access credential and specified by a property administrator.
- the access conditions can specify a time period for which access credential remains valid.
- the access conditions may specify limitations on the property rental that are imposed on and agreed upon by the user within a rental agreement.
- the access conditions may specify geographic rental restrictions (e.g., specific rooms that are accessible to the user), time-based rental restrictions (e.g., use of particular appliances within the property dunng a specified period of time), or actions during the rental that are strictly prohibited by the property administrator.
- access conditions specified by a property administrator may be associated with a distributed access credential to effectively enforce rental restrictions without requiring a property owner's presence.
- FIG. 1 illustrates a diagram of an example of a property management system 100 that is associated with a property 101.
- this disclosure is written in the context of controlling access to rental property, systems and techniques described herein can also be used for controlling access to properties for purchase (e.g., condos, houses, and/or commercial headquarters).
- FIG. 1 illustrates one property for brevity
- the application server 130 may also manage electronic locks and energy consuming devices for multiple properties and/or structures.
- the application server 130 may communicate directly with the monitor control unit 110 or through other communications media and protocol (e.g., through the network 105, over Bluetooth, Zigbee, etc.).
- the system 100 may include a monitor control unit 110, sensors 122, appliances 124, cameras 126, an electronic lock 128, and an application server 130 connected over a network 105.
- the network 105 enables the monitor control unit 1 10, sensors 122, appliances 124, cameras 126, the electronic lock 12.8, and the application server 130 to exchange data communications related to rental reservations and/or information related to the rental reservations.
- the network 105 also enables the system 100 to maintain data that defines a set of access conditions associated with an access credential that is distributed to a particular user that requests to rent the property 101.
- the architecture of the system 100 enables a property administrator 104 to rent the property 101 to a user 102 by use of a distributed access credential that is associated with the property 101 to the user 102, and specification of a set of access conditions 132 associated with property rental.
- the property administrator 104 may use a rental property management portal to specify the set of access conditions 132, which are then stored on the application server 130.
- the rental property management portal is described more particularly with respect to FIGS. 5A-5B.
- the access credentials associated with rental property maybe generated and distributed in a variety of ways during a property rental process.
- the access credential is generated in response to a user submitting a reservation to the rent the property 101 on a rental listing provided by the property administrator.
- an access credential may be generated for each reservation for the property 101 , and then distributed to the corresponding users that submitted each reservation. Once each user receives the distributed access credential, the user may then use the distributed access credential to view rental property' information on an application that may independent from the rental listing.
- the access credential may be pre-generated by the system once the property administrator creates a new rental listing for the property 101 and prior to receiving any rental reservations from users.
- the access credentials may- then be associated with the rental reservations, and distributed to the corresponding user.
- the access credential associated with the property to be rented is then distributed to trie user 102.
- the access credential may be distributed with the use of various communication mediums such as transmitting an email to the user, sending an SMS message to a mobile device associated with the user, initiating a system-generated telephone call to deliver the access credential to the mobile device associated with the user, among others.
- the communication may further include an instruction and/or reference to download an application on a device associated with the user, in some instances, the reference can include a deeplink to redirect the user to an application store page to download and install an application on the device, in other instances, the reference can instead be a hyperlink to a webpage that enables the user to submit the distributed access credential and other user-specific information to system 100. More particular discussions related to access credential submission and the application are described with respect to FIGS. 6A and 6B.
- the distributed access credential provides a means to authenticate a user into the system 100 to obtain information related to the rental property and/or utilize services offered as a part of the rental agreement. For example, as described more particularly with respect to
- the access credential enables the user to use a device to transmit instructions to the system 100 of the rental property to perform particular actions.
- Such actions can include enabling or disabling operation of connected devices inside the rental property, locking or unlocking electronic locks to gain access to regions within the property, among others.
- an access credential may initially be "inactive” prior to the user using the access credential to log into the application as described above. Once the user logins into the application using the access credential, its associated state may change to "active” to reflect that the user has obtained access to rental property information that is provided on the application.
- an "active" access credential may remain in such a state for a fixed time period (e.g., as defined by an associated access condition), or until a specified event takes place to revert the access credential to an inactive state (e.g., inactivating the distributed access credentials to other users for a rental property once one of the users has formed a rental agreement with the property administrator).
- the state of the access credential is adjusted to "enabled,” indicating that the start of the actual rental period.
- an "enabled" access credential may provide the user with a greater set of features on the application compared to an "active" access credential since the user has started the rental period.
- the network 105 is configured to enable exchange of electronic communications between devices connected to the network 105.
- the network 105 may include, for example, one or more of the Internet, Wide Area Networks (WANs), Local Area Networks (LANs), analog or digital wired and wireless telephone networks (e.g., a public switched telephone network (PSTN), Integrated Services Digital Network (ISDN), a cellular network, and Digital Subscriber Line (DSL)), radio, television, cable, satellite, or any other delivery or tunneling mechanism for carrying date.
- the network 105 may include multiple networks or subnetworks, each of which may include, for example, a wired or wireless data pathway.
- the network 105 may also include a circuit-switched network, a packet-switched data network, or any other network able to carry electronic communications (e.g., data or voice communications).
- the network 105 may include networks based on the Internet protocol (IP), asynchronous transfer mode (ATM), the PSTN, packet-switched networks based on IP, X.25, or Frame Relay, or other compaxabie technologies and may support voice using, for example, VoIP, or other comparable protocols used for voice communications.
- IP Internet protocol
- ATM asynchronous transfer mode
- the network 105 may include one or more networks that include wireless data channels and wireless voice channels.
- the network 105 may be a wireless network, a broadband network, or a combination of networks including a wireless network and a broadband network.
- the monitor control unit 110 may be an electronic device that coordinates and/or monitors the operations of the components of the system 100 through a set of data transmissions with each of the components of the system 100.
- the monitor control unit 110 includes a controller and a network module.
- the controller is configured to control a system 100 (e.g., a home alarm or security system) that includes the monitor control unit 110.
- the controller may include a processor or other control circuitry configured to execute instructions of a program that controls operation of an alarm system, in these examples, the controller may be configured to receive input from sensors, detectors, or other de vices included in the alarm system and control operations of devices included in the alarm system or other household devices (e.g., a thermostat, an appliance, lights, etc.).
- the controller may be configured to control operation of the network module included in the monitor control unit 1 10.
- the network module is a communication device configured to exchange
- the network module may be a wireless
- the network module may be a wireless communication device configured to exchange communications over a wireless data channel and a wireless voice channel.
- the network module may transmit alarm data over a wireless data channel and establish a two-way voice communication session over a wireless voice channel.
- the wireless communication device may include one or more of a LIE module, a GSM module, a radio modem, cellular transmission module, or any type of module configured to exchange communications in one of the following formats: LTE, GSM or GPRS, CDMA, EDGE or 1 GPRS. EV-DO or EVDO, UMTS, or IP.
- the network module may also be a wired communication module configured to exchange communications over the network 105 using a wired connection.
- the network module may be a modem, a network interface card, or another type of network interface device.
- the network module may be an Ethernet network card configured to enable the monitor control unit 110 to communicate over a local area network and/or the Internet.
- the network module also may be a voice-band modem configured to enable the alarm panel to communicate o ver the telephone lines of Plain Old Telephone Systems (POTS).
- POTS Plain Old Telephone Systems
- the monitor control unit 110 also may include a communication module that enables the monitor controi unit 110 to communicate other devices of the system 100.
- the communication module may be a wireless communication module that allows the monitor control unit 110 to communicate wirelessly.
- the communication module may be a Wi-Fi module that enables the monitor control unit 1 10 to communicate over a local wireless network at the property 101.
- the communication module further may be a 900 MHz wireless communication module that enables the monitor control unit 110 to communicate directly with a monitor control unit.
- Other types of short-range wireless communication protocols such as Bluetooth, Bluetooth LE, Zwave, ZigBee, etc., may be used to allow the monitor controi unit 110 to communicate with other devices in the property 101.
- the monitor controi unit 1 10 may include data capture and recording devices.
- the monitor control unit 110 may include one or more cameras 126, one or more motion sensors, one or more microphones, one or more biometric data collection tools, one or more temperature sensors, one or more humidity sensors, one or more air flow sensors, and/or any oilier types of sensors that may be useful in capturing monitoring data related to the property 101 and users in the property.
- the monitor control unit 1 10 further may include processor and storage capabilities.
- the monitor control unit 1 10 may include any suitable processing devices that enable the monitor control unit 110 to operate applications and perform the actions described throughout this disclosure.
- the monitor controi unit 110 may include solid state electronic storage that enables the monitor control unit 110 to store applications, configuration data, collected sensor data, and/or any other type of information available to the monitor control unit 110.
- the monitor control unit 110 may exchange communications with the sensors 12.2, the appliances 124, the cameras 126, the electronic lock 128, and the application server 130 using multiple communication links.
- the multiple communication links may be a wired or wireless data pathways configured to transmit signals from sensors 122, the appliances 124, the cameras 126, the electronic lock 128, and the application server 130 to the controller.
- the sensors 122, the appliances 124, the cameras 126, the electronic lock 128, and the application server 130 may continuously transmit sensed values to the controller, periodically transmit sensed values to the monitor control unit 110, or transmit sensed values to the monitor control unit 1 10 in response to a change in a sensed value.
- the monitor control unit 1 10 may additionally be used to perform, routine surveillance operations on a property.
- the monitor control unit 1.10 may be assigned to one or more particular properties within a geographic location and may routinely collect surveillance footage during specified time periods (e.g., after dark), which may then be transmitted to the application server 130 for transmitting back to each particular property owner.
- the properly owner may receive the surveillance footage over the network 105 as a part of a service provided by a security provider that operates the application server 130.
- transmissions of the surveillance footage collected by the monitor control unit 1 10 may be part of a premium security service package provided by a security provider in addition to the routine drone emergency response service.
- the monitor control unit 1 10 may monitor the operation of the electronic devices of the system 100 such as sensors 122, the appliances 124. the cameras 126, the electronic lock 128, and the application server 130. For instance, the monitor control unit 1 10 may enable or disable the devices of the system 100 based on a set of rules associated with energy consumption, user-specified settings, and/or other information associated with the conditions near or within the property 101 where the system 100 is located. In some examples, the monitor control unit 1 10 may be used as a replacement to a traditional security panel (or monitor control unit) that is used to monitor and control the operations of the system 100. in other examples, the monitor control unit 110 may coordinate monitoring operations with a separate security panel of the system 100. in such examples, the monitor control unit 110 may monitor particular activities of the devices of the system 100 that are not monitored by the security panel, or monitor the operation of particular devices that are not monitoring by the security panel.
- the monitor control unit 110 may monitor particular activities of the devices of the system 100 that are not monitored by the security panel, or monitor the operation of particular devices that are not
- the property 101 may include various monitoring devices that are each capable of performing individual monitoring operations and/or capable to performing a set of coordinated operations based on instructions recei ved from either the monitor control unit 1 10 or the appiication server 130.
- the property 101 may include the sensors 122, the appliances 124, the cameras 126, the electronic lock 128, the application server 130 and other devices that provide monitoring data associated with devices, areas, or individuals located nearby or wi thin the premi ses of the property 101.
- the cameras 126 located on the property 101 may provide video, still images, or other monitoring data, and may provide data via a live feed, transmit data to be stored in a remote location, store data locally for re vie w at a later time, etc.
- the sensors 122 located on the property 101 may include motion sensors, heat sensors, pressure sensors, resistive sensors, etc. that periodically collected sensed data indicating conditions of the property 101.
- the sensors 122 may communicate with the system 100 and transmit monitoring data for processing to the monitoring control unit 110.
- the sensors 122 may store collected data locally or transmit monitoring data to be stored in a remote location (e.g., the application server 130).
- the multiple communication links may further include a local network within the network 105.
- the monitor control unit 1 10, the sensors 122, the appliances 124, the cameras 126, the electronic lock 128, and the application server 130 may exchange data and commands over the local network as described herein.
- the local network may include 802.11 "Wi-Fi” wireless Ethernet (e.g., using low-power Wi-Fi chipsets), Z-Wave, Zigbee, Bluetooth, "Homeplug” or other "Powerline” networks that operate over AC wiring, and a Category 5 (CATS) or Category 6 (CAT6) wired Ethernet network.
- the local network may be a mesh network constructed based on the devices connected to the mesh network.
- the system 100 may include one or more of a contact sensor, a motion sensor, a glass break sensor, an occupancy sensor, or any other type of sensor that can be included in an alarm or security system.
- the sensors 122 may also include an environmental sensor, such as a temperature sensor, a water sensor, a rain sensor, a wind sensor, a light sensor, a smoke detector, a carbon monoxide detector, an air quality- sensor, etc.
- the sensors 12,2 may further include a health monitoring sensor, such as a prescription bottle sensor that monitors taking of prescriptions, a blood pressure sensor, a blood sugar sensor, a bed mat configured to sense presence of liquid (e.g., bodily fluids) on the bed mat, etc.
- the sensors 122 may include a radio-frequency identification (RFID) sensor that identifies a particular article that includes a pre-assigned RFiD tag.
- RFID radio-frequency identification
- the appliances 124 may be home automation devices connected to the network 105 that are configured to exchange electronic communications with other devices of the system 100.
- the appliances 124 may include, for example, connected kitchen appliances, controllable light sources, safety and security devices, energy management devices, and/or oilier types of electronic devices capable of exchanging electronic communications over the network 105.
- the appliances 124 may periodically transmit information and/or generated data to the monitor control unit 110 such that the monitor control unit 110 can automatically control the operation of the appliances 124 based on the exchanged communications.
- the monitor control unit 110 may operate one or more of the appliances 124 based on a fixed schedule specified by the user.
- the monitor control unit 1 10 may enable or disable one or more of the appliances 124 based on received sensor data from the sensors 122.
- the cameras 126 may be video/photographic cameras or other type of optical sensing devices configured to capture images.
- the cameras 126 may be configured to capture images of an area within a building monitored by the monitor control unit 110.
- the cameras 126 may be configured to capture single, static images of the area and also video images of the area in which multiple images of the area are captured at a relatively high frequency (e.g., thirty images per second).
- the cameras 126 may be controlled based on commands received from the monitor control unit 110.
- the cameras 126 may be triggered by several different types of techniques. For instance, a Passive Infra Red (PIR) motion sensor may be built into the cameras 126 and used to trigger the cameras 126 to capture one or more images when motion is detected.
- the cameras 126 also may include a microwave motion sensor built into the camera and used to trigger the cameras 126 to capture one or more images when motion is detected.
- the cameras 126 may have a "normally open” or " 'normally closed " ' digital input that can trigger capture of one or more images when external sensors (e.g., the sensors 122, PIR, door/window, etc.) detect motion or other events.
- the cameras 126 receives a command to capture an image when external devices detect motion or another potential alarm event.
- the cameras 126 may receive the command from the controller or directly from, one of the sensors 122.
- the cameras 126 trigger integrated or external illuminators (e.g., Infra Red, Z-wave controlled "white” lights, etc.) to improve image quality when the scene is dark.
- integrated or separate light sensor may be used to determine if illumination is desired and may result in increased image quality.
- the cameras 126 may be programmed with any combination of time/day schedules, system "arming state", or other variables to determine whether images should be captured or not when triggers occur.
- the cameras 126 may enter a low-power mode when not capturing images. In this case, the cameras 126 may wake periodically to check for inbound messages from the controller.
- the cameras 126 may be powered by internal, replaceable batteries if located remotely from the monitor control unit 110.
- the cameras 126 may employ a small solar cell to recharge the battery when light is available.
- the cameras 126 may be powered by the controller's 1 12 power supply if the cameras 126 is co-located with the controller.
- the cameras 126 communicates directly with the application server 130 over the Internet, In these implementations, image data captured by the cameras 126 does not pass through the monitor control unit 110 and the cameras 126 receives commands related to operation from the application server 130.
- the electronic lock 128 may be an electronic computing device that is placed on the exterior of the property 101 and configured to provide access to a user with the presentation of a distributed access credential through the user device 140.
- the access credential may be considered to be in an "active' " state, indicating that the user has used the distributed access credential to view property information related to the property 101.
- the information associated with the activated access credential e.g., access conditions specified by the property administrator 104, user information associated with the distributed access credential, etc.
- the transmitted information may include a stored access credential that is then used by the electronic lock 128 to establish communications with the user device 140 when the user 102 (previously, the user) first accesses the property 101 to initiate the rental period.
- the application server 130 is an electronic device configured to provide monitoring services by exchanging electronic communications with the monitor control unit 110 and the user device 140 over the network 105.
- the application server 130 may be configured to monitor events (e.g., start or end of a rental period, user activity data collected during a rental period) generated by the monitor control unit 110 and/or other devices connected over the network 105.
- the application server 130 may exchange electronic communications with the network module included in the monitor control unit 110 to receive information regarding events detected by the monitor control unit 110.
- the application server 130 also may receive information regarding events from the user device 150 of a property administrator 104 (e.g., rental property information, access credentials distributed to users, and/or access conditions associated with access credentials for the property).
- the applications server 130 may also exchange data communications with the user device 140 associated with the user 102. For instance, after the user 102 activates the distributed access credential on an application running on the user device 140 (depicted more particularly in FIG. 6A), the applicant may transmit the activated access credential and user-specific information (e.g., username, last name, password, etc.) to the application server 130.
- the application server 130 may store the received access credential and determine a set of access conditions 132 that are associated with an access credential for the property 101. As described herein, one or more access credentials are created for the property 101 once the property 101 becomes available for rent (e.g., an online listing on a propeity rental website).
- the property administrator 104 may specif ⁇ ' access conditions 132 to specify attributes and/or limitations associated with the property rental. For example, as described more particularly with respect to FIG. 5A, the property administrator 104 may use a rental property management portal to specify the access conditions 132 on the user device 150. In response, the specified access conditions 132 are then transmitted and stored on the application server 130.
- the access conditions 132 refer to specifications and/or limitations associated with a property rental.
- the access conditions 132 may include attributes associated with the access credential (e.g., time period of activation), indications as to whether the property rental is for the entire property or a particular region within the property (e.g., limiting access to particular rooms), ancillary services that are included with the property rental (e.g., time-limited access to the appliances 124), among other types of rental specifications.
- the user 102 may transmit instructions to perform actions related to the property rental. Examples of actions may include signals to operate the appliances 124, locking and unlocking the electronic lock 128, among others.
- the application running on the user device 140 may present a user interface with user-selectable options to perform particular actions.
- the instructions to perform the may then be transmitted to either the application server 130 (e.g., when a user 102 physically accesses the property 101 for the first time or in cases where the user device 140 does not directly communicate with the monitor control unit 1 10), or directly to the monitor control unit 110 or other devices connected over the network 105 (e.g., afterthe user device 140 has already established communications with the monitor control unit 110).
- the application server 130 stores sensor and image data received from the monitor control unit 110 and performs analysis of the received sensor and image data. Based on the analysis, the application server 130 may communicate with and control aspects of the monitor control unit. 1 10 or the user device 140.
- the user device 140 may be an electronic device associated with a user or the user 102 and the user device 150 may be an electronic device associated with the property administrator 104.
- the user devices 140, 150 that exchange network communications over the network 105.
- the user devices 140, 150 may be one or more of a smartphone, tablet, personal computer (PC), network-enabled media player, home entertainment system, cloud storage device, and other types of network devices.
- the user devices 140, 150 may access an application made available by the application server 130 on the network 105, such as an application (depicted in FIGS. 5A-5B and 6A-6B).
- the data generated by the user devices 140, 150 may include over the network 105, which may be monitored by the monitor control unit 110.
- the user devices 140, 150 can include a native application.
- the native application refers to a software/firmware program running on the corresponding mobile device that enables the user interface and features described throughout.
- the user devices 140, 150 may- load or install the native surveillance application based on data received over a network (e.g., the network 105) or data received from local media.
- the native application is capable of operating on various mobile devices platforms.
- the native application also enables the user devices 140, 150 to receive and process rental property data from the system 100.
- the user devices 140, 150 communicate with and receive system data from the monitor control unit 110 or the application server 130 using a communication link.
- the user devices 140, 150 may communicate with the monitor control unit 110 using various local wireless protocols such as Wi-Fi, Bluetooth, Zwave, Zigbee, HomePlug (Ethernet over powerline), or wired protocols such as Ethernet and USB, to connect the user devices 140, 150 to local security and automation equipment.
- the user devices 140, 150 may connect locally to the system 100 and sensors 122 and other devices.
- the local connection may improve the speed of status and control communications because communicating through the network 105 with a remote server (e.g., the application server 130) may be significantly slower.
- the user devices 140, 150 are shown as communicating with the application server 130, the user devices 140, 150 may also communicate directly with the sensors 122 and other devices controlled by the monitor control unit 110 when the user devices 140, 150 are near the property 101. For example, the user devices 140, 150 may exchange communications with the devices of the system 100 over the network 105.
- the user devices 140, 150 receive system data captured by the monitor control unit 110 through the network 105.
- the user devices 140, 150 may receive the data from the monitor control unit 110 through the network 105 or the application server 130 may relay data received from the monitor control unit 110 to the user devices 140, 350 through the network 105.
- the application server 130 may facilitate communication between the user devices 140, 150 and the system 100.
- the system 100 intelligently leverages the monitor control unit 1 10 to aid in security monitoring, property automation, and property management.
- the monitor control unit 110 may aid in investigating alarm events detected at the property 101 by the monitor control unit 1 10.
- the monitor control unit 1 10 may detect an alarm event (e.g., a fire alarm, an entry into the property 101 when the system is armed "Stay,” etc.) and, based on the detected alarm event, control the monitor control unit 110 to attempt to identify persons in the property 101 at the time of the alarm event.
- an alarm event e.g., a fire alarm, an entry into the property 101 when the system is armed "Stay,” etc.
- FIG. 2 illustrates an example of a process 200 for generating a unique access credential for a user that requests to rent a property.
- the process 200 may include receiving input from, a property administrator 104 specifying one or more access conditions associated with a property (210), accessing rental data associated with the property from a user (220), generating a unique access credential for the user (230), and transmitting the unique access credential to a device associated with the user (240).
- the process 200 may include receiving input from a property administrator 104 specifying one or more access conditions associated with a property (210).
- the user device 150 may receive input from the property administrator 104 that specify the access conditions 132 associated with the property 101 on an application running on the user device 150.
- the application may be an application that is configured to exchange communications with the monitor control unit 110 or the application server 130.
- the input from the property administrator 104 may include selections of user-selectable interface objects that are associated with rental property specifications (e.g., rental time period, ancillary services available during the rental period, scope of rental within the property, etc. ).
- the process 200 may include accessing rental data associated with the property from a user (220).
- the application server 130 may receive data from the user device 140 associated with a user that indicates that the user is renting the property 101.
- the rental data may include a rental start date and time and a rental end date and time.
- the process 200 may include generating a unique access credential for the user (230),
- the application server 130 may generate a user-specific access credential for the user associated with the user device 140.
- the generated access credential may be used as a user credential used to authenticate the user as the person that made the reservation.
- the generated access credential may have attributes that control its use with components of the monitor control unit.
- the generated access credential may be associated with the access conditions 132 specified by the property administrator 104.
- the process 200 may include transmitting the unique access credential to a device associated with the user (240). For instance, after generating the access credential for the user, the application server 130 may then distribute the generated access credential to the user device 140. As described herein, the distribution of the generated access credential may include a transmission of an email to an email address corresponding to the user, a SMS message using the mobile capabilities of the user device 140, or other type of electronic formats.
- FIG. 3 illustrates an example of a process 300 for enabling a user to access information associated with a rental property.
- the process 300 may include receiving an access credential submitted by a user (310), obtaining rental data associated with a property (320), determining that user information included in the rental data matches user information specified by a property administrator (330), providing access to an application (340), and performing one or more action associated with the user (350).
- the process 300 may include recei ving an access credential submitted by a prospective (310). For instance, once an access credential is distributed to the user device 140 associated with a user, the user device 140 may also receive a link to install an application associated with tire application server 130 on the user device 140. The user may be directed to install the application on the user device 140 through a webpage or through a deep-link that, redirects the user to a page in an application store. After installing the application on the user device 140, the user may submit the distributed access credential on the application, which is then transmitted to the application server 130.
- the process 300 may include receiving user rental data associated with a property (320). For instance, after receiving the submitted access credential from the application running on the user device 140, the application server 130 may identify the rental property (e.g., property 101) associated with the submitted access credential and obtain rental data stored a database that includes rental data for all properties of the property administrator 104 that are available for rent. For example, the rental data may include information associated with the property 101, user information for any users, or information submitted by the property administrator 104 on a rental property listing.
- the rental property e.g., property 101
- the rental data may include information associated with the property 101, user information for any users, or information submitted by the property administrator 104 on a rental property listing.
- the process 300 may include determining that the user information included in the rental data matches user information specified by a property administrator (330). For instance, in response to obtaining rental data associated with the property 101, the application server 130 may identify user information associated with the submitted access credential
- the application server (e.g., last name of the user) that is included in the obtained rental data.
- the application server (e.g., last name of the user) that is included in the obtained rental data.
- the 130 may also identify user information that is specified by the property administrator 104, and compare the user information associated with the submitted access credential and the user information submitted by the property administrator 104. For example, the comparison may be used to detect fraudulent attempts to rent the property 101 by unauthorized entities (e.g., any individual that the property administrator 104 does not designate as the user to receive the distributed access credential), if the user information associated with the submitted access credential matches the user information submitted by the property administrator, then the application server 130 determines a successful attempt to access property information related to the property 101 .
- unauthorized entities e.g., any individual that the property administrator 104 does not designate as the user to receive the distributed access credential
- the application server 130 may have a reservation with an access credential of "1234" associated with the user "John Doe” and receive an access credential of "1234" and last name of "Doe” and determine that the received last name of "Doe” matches the last name of "Doe” associated with the reservation associated with the access credential of "1234.”
- the application server 130 may have a reservation with an access credential of "1234" associated with the user "John Doe” and receive an access credential of "1234" and last name of "Smith” and determine that the received last, name of "Smith” does not match the last name of "Doe” associated with the reservation associated with the access credential of "1234.”
- the process 300 may include providing access to an application (340). For instance, in response to determining that the user information associated with the submitted access credential matches the user information submitted by the property administrator 104, the application server 130 may provide access to an application through which the user submitted the access credential. More particular descriptions related to the application are described with respect to FIGS. 6A-6B.
- the process 300 may include performing one or more action associated with the user (350). For instance, as described herein with respect to FIG. 1, once the user has obtained access to the application rannmg on the user device 140, the user may transmit instructions to perform, actions related to the property 101 through the application. For example, the user may transmit an instruction to operate one of the appliances 124 within the property, which is then transmitted either to the application server 130, or directly to the monitor control unit 110 or the particular appliance. In this example, the established communication pathway between the user device 140, the application server 130, and the monitor control unit 110 may be over the network 105 once the user obtains access to the application used to perform actions related to properly rental at or near the property 101. [0083] FIG.
- the rental property 410 includes regions one and two, which can be separately rented to different user users, and a common region that is accessible to all user users.
- the regions one and two can represent different bedrooms within a rental property that is rented to different users during an overlapping rental period.
- the region one and two can represent different floors, sub-units, or other types of divisions within a single property or dwelling,
- Access to the premises and different regions within the property 410 can be controlled using electronic locks 422, 424, and 426.
- the electronic locks 422, 424, and 426 correspond to the electronic lock 128 as described herein with respect to FIG. 1 .
- the electronic lock 422 provides access to the common region of the property 410
- the electronic lock 424 provides access to region one
- the electronic lock 426 provtdes access to region two.
- an access credential distributed to a user can be used to configure a device associated with the user such that the user device can unlock the applicable electronic devices using instructions transmitted through the device.
- the user may use an application that is enabled by the distributed access credential to transmit an instruction to a system 100 (e.g., the system 100) associated with property 410.
- the system 100 identifies access credential information for three users that have access to the property 410, which are shown in tables 432, 434, and 436.
- the tables each identify user-specific information associated with respective access credentials (e.g., user IDs) and specifies a permission level that dictates privileges to access various regions of the property 410.
- user A represents a property administrator 104 that has privileges to access all regions of the property 410.
- users B and C represent users that rent different regions (e.g., regions one and two) of the property 410.
- the users B and C may be co-users that both rent the different regions of the property 410 during an overlapping period of time.
- the regions one and two can represent different rooms within the property 410 that are made available for rent by the property administrator 104.
- the tables 432, 434, and 436 identify respective access privileges that are specified by the corresponding access credential for each user. For example, the access credential distributed to user B indicates that he/she has access to region one but not to region two, and whereas the access credential distributed to user C indicates that he/she has access to region two but not to region one.
- the tables 432, 434, and 436 specify the type of access credential distributed to each user. For example, user A has a permanent access credential that provides access to the property 410, whereas user B has a temporary access credential that provides access on a daily basis, and user C has a temporary access credential that provides access to the property 410 on a monthly basis.
- access credential distribution can be used to specify different types of tenancies of the property 410 (e.g., temporary, at-will, lease, etc.), while also enabling the property administrator 104 to specify the level of access to provide with each type of tenancy (e.g., access to the entire premises for daily periods, or access to a particular region for monthly periods).
- types of tenancies of the property 410 e.g., temporary, at-will, lease, etc.
- the property administrator 104 can specify the level of access to provide with each type of tenancy (e.g., access to the entire premises for daily periods, or access to a particular region for monthly periods).
- the property administrator 104 may receive various alerts or notifications based on the acti vity of users at or near the property 410. For example, the property administrator 104 may initially receive an alert 440 when a user initially unlocks the lock 422 and to obtain possession over the property 4.10. In other examples, the property administrator 104 may also receive alerts when a user attempts to perform actions that are prohibited by the access conditions described herein. For instance, if the access credential distributed to a particular user indicates that they cannot access a specific region within the property, then the system 100 (e.g., the system 100) of the property 410 may perform one or more monitoring operations to detect if and when the particular user attempts to access the prohibited region.
- the system 100 e.g., the system 100
- the system 100 may then transmit an alert to a device associated with the property administrator 104 indicating information such as, for example, the number of unauthorized actions attempted, timestamps associated with the actions attempted, among other types of information, in some implementations, the monitoring operations can additionally or alternatively include obtaining data collected by the devices associated with the system 100 (e.g., obtaining sensor data collected by the sensors 122, or collecting video data collected by the cameras 126).
- FIGS. 5A-5B illustrate examples of user interfaces 500A and 500B of an application that includes a rental property management portal used by a property administrator 104.
- interface 500A enables a property administrator 104 to view the statuses associated with a list of rental properties
- interface 500B enables the property administrator 104 to view detailed rental information associated with a single property.
- FIGS. 5A-5B illustrate the interfaces 500A and 500B being displayed on an application running on a device 502, in other implementations, the interfaces 500A and 500B can also be displayed in other electronic formats such as a desktop application, a webpage, or other types of content distribution interfaces.
- the device 502 corresponds to the user device 150 described herein with respect to FIG. 1.
- the interface 500A includes a reservation management page that displays an overview of all available rental properties that are either managed or owned by the property administrator 104.
- table 510 identifies each rental property and indicates a rental/access status associated with each rental property. Hie rental/access status indicates whether a user s activated a distributed access credential for a corresponding rental property and the access period specified by the distributed access credential.
- the table 510 specifies an "INACTIVE (NO RESIDENTS)" status for the "123 MAIN ST" property, indicating that the system has not yet distributed an access credential for the property to a user.
- the table 510 specifies an "ACTIVE - USER HAS ACTIVATED TOKEN (MONTHLY)" status for the "9 FIRST ST, APT. 3" property, indicating that the system, has distributed a single access credential for the rental property on a monthly basis to a user, who has activated the distributed access credential.
- tire table 510 specifies an "ACTIVE - MULTIPLE ACCESS
- CREDENTIALS ACTI VATED (DAILY)" status for the "15 SECOND DR.” property, indicating that the system has distributed multiple access credentials for the rental property on a daily basis to multiple co-users that each rent a particular region of the rental property.
- the interface 500B includes a property detail page that allows a property administrator to view and adjust property-specific information associated with a rental property.
- the property detail page includes property information 512, user information 514, and an alert button 516.
- the property information 512 specifies a property address (e.g., "15 Second Drive, Washington, DC 20001"), a property type (e.g., a house), and/or other information (e.g., 3 -bedroom, 2 -bath).
- the user information 514 includes a usemame associated with a user and specifies access credential information associated with the user.
- the access credential information for the user "USER0Q1" indicates that the access credential is "ACTIVE (NOT ENABLED).”
- this indicates that the user has entered a distributed access credential into an application (e.g., into the interface 600A depicted in FIG. 6A), but has not yet used the access credential to physically access the property thereby initiating the rental period.
- the user information 514 further specifies a set of specifications and services that are associated with the property rental by the user 102.
- specifications may include the time period for rental (e.g., 5-day access), ancillary services that are included within the rental (e.g., access to appliances), and/or the scope of access within the property that is covered under a rental agreement (e.g., partial property access).
- the user information 514 may provide the property administrator 104 with an option to adjust preconfigured access settings during various time points of a rental agreement (e.g., after a rental agreement has been formed but before the start of the rental period, or during the rental period, etc.). For instance, a property administrator 104 may choose an option to adjust access settings during a rental period by selecting the "ADJUST ACCESS
- SETTINGS "SETTINGS" button, which then redirects the property administrator 104 to an access configuration page that allows the property administrator 104 to specify specifications associated with the property rental.
- the system 100 may then provide an additional notification to the user 102, and/or dynaniically reconfigure the system 100 associated with the property 101 to effectuate the updated rental specifications.
- a property administrator 104 may wish to restrict access to a particular appliance within the property 101 after a rental agreement that includes access to the particular appliance has been formed.
- the application server 130 may transmit an instaiction to the monitor control unit 110 to adjust a set of access configurations associated with the distributed access credential.
- the monitor control unit may use the set of adjusted access configurations to restrict access to the particular appliance.
- the alert button 516 provides the property administrator 104 with the option to transmit notifications, alerts, and/or other supplemental information to all users associated with the particular rental property displayed within the property detail page.
- the property administrator 104 may use the alert button 516 to transmit property -related information (e.g., maintenance updates, payment reminders, updates on user service requests, etc.).
- FIGS. 6A-6B illustrate examples of user interfaces 600A and 600B, respectively, for an application that is used by users such as temporary guests of a rental property.
- interface 600A enables a user to submit an access credential for authentication purposes to obtain access to the application.
- the interface 600B enables the user to view and access rental property information after gaining access to the application using the submitted access credential.
- FIGS. 6A-6B illustrate the interfaces 600 A and 600B being displayed on an application, in other implementations, the interfaces 600A and 600B can also be displayed in other electronic formats such as through a webpage portal.
- the interface 600A represents a login page of the application that runs on a user device 602.
- the user can access the interface 600A on the user device 602 to submit an access credential 612 for authentication into the application.
- the application is capable of exchanging communications with an application server associated with a monitoring system of the rental property, as depicted in FIG. 1.
- access to the application through the interface 600A enables the user to, for example, control electronic devices of the monitoring system using actions presented through application.
- the user can use the application to gain physical access to the property (e.g., by unlocking an electronic lock), control electronic devices located within the property (e.g., by submitting remote instructions through the application), among others.
- the actions may include all actions that users are permitted to trigger in the property.
- such actions can include viewing and accepting the terms of a rental agreement, accessing additional property information, exchanging communications with the property administrator 104, among oilier types of actions.
- the user 102 may initially receive a distributed access credential in response to submitting an inquiry related to a rental property (e.g., a reservation request submitted for an electronic rental listing for the rental property), in some implementations, the distnaded access credential is associated with external account information of the user (e.g., username, last name, etc.) such as a user account for a rental property listing website or a rental property listing application.
- the user submits an access credential 612 that includes PIN number and a last name. Once the user has submitted the access credential 612 on the login page, the distributed access credential becomes "active." As discussed previously with respect to FIG.
- the activated access credential refers to an indication that a user has used a distributed access credential to access an application.
- an activated access credential provides the property administrator 104 with an indication that the user may have an interest in renting the rental property.
- multiple access credentials may be distributed for a single property (e.g., to multiple users), and once a particular user agrees to enter into a rental agreement, the corresponding access credential becomes "enabled," indicating that she rental property is no longer available for rent to other users.
- the system 100 may automatically deactivate all other access credentials that have been pre viously distributed to other users.
- an access credential operates as a single-use token that provides only a single user with access to property information on an application.
- a distributed access credential only the user 102 that has already formed a rental agreement with a property administrator 104 is provided a distributed access credential.
- the distributed access credential can then be used by the user 102 to perform actions that are related to the property rental as described throughout. For example, such actions can. include transmitting an instruction to the system 100 to unlock the electronic lock 128 in order to physically access the property 101, transmitting instructions to operate the appliances 124 within the property 101, and/or exchanging communications with the property administrator 104.
- the system 100 associated with the property 101 may receive and store user- specific information associated with the distributed access credential (e.g., username, password, last name, etc .) prior to the start of the rental period.
- user-specific information e.g., username, password, last name, etc .
- the system 100 may then perform a user verification operation to ensure that the presentation of the access credential is by an authorized user and/or user device.
- the user-specific information may include information that is uniquely available to the user 102 (e.g., answers to security questions), hardware-related information of the user device 140, among other types of information.
- the system performs different types of verification operations in association with the access credential submitted by the user on the application. For example, in some instances, the system performs a verification operation prior to distributing an access credential to the user and/or allowing the user to access a login page of the application where an access credential can be submitted such as the interface 600A . In such instances, the system initially verifies that the user that is provided the distributed access credential and/or with access to the login page of the application is actually the actual user that that submitted the rental reservation and/or formed the rental agreement.
- the user may be requested to provide user-specific information that is used to identify the identity of the user (e.g., user-specific information associated with an account for a property listing website).
- user-specific information e.g., user-specific information associated with an account for a property listing website.
- the user is distributed the access credential and/or provided with access to the login page of the application where the distributed credential can be submitted only after his/her identity has been verified.
- the system performs a verification operation after the user has submitted the access credential on, for example, a login page of the application such as the interface 600A.
- the system can verify either the submitted access credential (e.g., determining whether a submitted PIN code is correct), or verify some other type of externally associated data related the access credential such as uniquely identifiable information for the user submitting the access credential, and/or de vice data for the user device used to submit the access credential.
- the user may be requested to provide account information associated with an existing account (e.g., an account associated with a rental listing website), which is then used as a second factor authentication in addition to the submitted access credential.
- the user may be requested to provide identifying information for the rental property (e.g., a property identifier) in order to verify that he/she is attempting to access the correct rental property through the application.
- sensor data such as location data of the user device can be used to verify- the submitted access credential.
- the system determines that the submitted access credential is verified only if the user is within a threshold proximity to the location of the rental property.
- the system may perform such verification operations after the access credential has been activated but before the access credential has been enabled to prevent unauthorized users from gaining access to the property. For example, when a user attempts to physically access the rental property, location data of the user device used by the user can be used to determine if he/she is within a threshold proximity (e.g., within 50 feet) of the location of the rental property, in this example, even though the user has previously activated the access credential, he/she can only enable the access credential to gain access to the property if the system verifies that his/her associated device is located nearby the property.
- a threshold proximity e.g., within 50 feet
- the interface 600B provides a rental property access page that provides a user with rental property access information through an application.
- the rental property access page may include property information 622, available service information 624, and an alert button 626.
- the property information 62,2 specifies a property address (e.g., " 15 Second Drive, Washington, DC 20001"), access credential status and information (e.g., provided on a daily basis and active for four more days), and/or other rental information (e.g., shared rental with one other user).
- the available service information 624 specifies various types of services that are associated with the rental property. For instance, the available service information 624 may specify regions of the property that are physically accessible by the user 102 under the rental agreement, (e.g., rooms 1, 2) and associated access information such as the remaining time period that the enabled access credential provides physical access to the user 102 (e.g., four days remaining within a rental period).
- regions of the property that are physically accessible by the user 102 under the rental agreement e.g., rooms 1, 2
- associated access information such as the remaining time period that the enabled access credential provides physical access to the user 102 (e.g., four days remaining within a rental period).
- the available service information 624 also specifies a list of appliances and other electronic devices that are available for use by the user 102 during the property rental, in the example depicted, the available service information 624 specifies a list of smart appliances that can be operated by exchanging communications between the system 100 within the property 101 and the user device 602. For example, the user 102 may transmit instructions to the monitor control unit 110 or the application server 130, which then relays the instructions to the appliances 124.
- the access credential distributed to the user 102 and the corresponding specifications provided to the system 100 enables the user 102 to access the appliances 124 that are indicated in the access conditions described herein with respect to FIGS. 5A and 5B.
- the access conditions provide limitations on access privileges granted by a distributed access credential (e.g., availability from 9AM to 10PM).
- the alert button 626 provides the user 102 to transmit messages, alerts, notifications, or other types of communication to the property administrator 104 in a manner similar to that of the alert button 516 described herein with respect to FIG. 5B, but from the perspective of the user 102.
- FTG. 7 is a flowchart that illustrates an example of a process 700 for providing temporary access to a property.
- the process 700 can include the operations of generating an access credential for a property (710), transmitting data indicating the access credential (720), receiving access data indicating a submitted access credential (730), determining that the submitted access credential is valid (740), and providing access to user interface enabling access to the property (750).
- the operations of the process 700 can generally be executed by one or more components of the system 100 as depicted in FIG. 1.
- the operations can be performed by the application server 130, the monitor control unit 1 10, or a combination thereof.
- the descriptions below are provided in reference to the application server 130 for brevity,
- the process 700 can include the operation of generating an access credential for a property (710).
- the application server 130 generates an access credential that specifies a time period that the access credential provides access to the property 101.
- the access credential can be generated at various time points in relation to the rental process.
- the access credential is generated once the property administrator 104 creates an electronic listing for the property 101 on a rental listing website but before a user actually submits a reservation request for the rental listing.
- the access credential is generated once a user submits a reservation request to the rental listing.
- the access credential specifies a time period that the access credential can be used to provide the user 102 with access to the property 301.
- the time period corresponds to a rental period during which the user 102 rents the property 101 under a rental agreement with the property administrator 104.
- the access credential is revoked after the rental period (e.g., the user 102 is unable to use the access credential to access the property 101).
- the time period corresponds to a time period specified by the property administrator 104 irrespective of the rental period.
- the generated access credential can also have different configurations and/or functions based on their specific application.
- a generated access credential can be used by multiple users to access rental property information through an application. For example, before a rental agreement has been formed between the property administrator and a user, a single access credential can be used by multiple users to access rental property information over the application.
- multiple user-specific access credentials can be generated for each user that submits a rental reservation for the same time period before a rental agreement has been formed for the time period.
- access credentials may be used multiple times by one or more users.
- access credentials can be used as single-use tokens that are only capable of used once by a user.
- the format and/or content of the generated access credential can vary across different implementations.
- the access credential is an
- the access credential can be distributed to the user device 140 as, for instance, a text message that includes alphanumeric code.
- the access credential represents a combination of an access code and other association information such as personally identifiable information for the user 102,
- the access credential can include both an access code and a last name for the user 102.
- the access credential represents a combination of an access code and property-specific information for the property 101 that allows the application to associate the access credential with the property 101.
- the access credential can include an access code and an identifier for the property 101 that is associated with an electronic rental property listing.
- the access credential specifies one or more access conditions that provide, for example, restrictions for accessing the property using the access credential.
- the access conditions can specify regions of the property that are accessible by the user 102 using the access credential and other regions of the property that are inaccessible by the user 102.
- Other examples of access conditions include the type of access provided by the access credential (e.g., permanent, temporary).
- the specified access conditions can be adjusted during the time period when an access credential is "enabled" (e.g., being used by the user 102 to access the property 101).
- an access credential is "enabled” (e.g., being used by the user 102 to access the property 101).
- the property administrator 104 may- adjust access conditions specifying access for the user 102, during the rental period, and in response, the system modifies the access credential distributed to the user 102 to specify the modified access conditions.
- the user 102 can either be distributed a second access credential, or the application configuration protocol can be changed and/or updated to implement the modified access conditions specified by the adjusted access credential.
- the process 700 can include the operation of transmitting data in dicating the access credential (720).
- the application server 130 can transmit data indicating the access credential to the user device 140 of the user 102 using various types of electronic mediums (e.g., e-mail, text message, etc.).
- the access credential can be distributed to the user device 140 at different time points of the rental process across different implementations. For example, in some implementations, the access credential is distributed to the user 102 after he/she has submitted a reservation request but prior to the formation of a rental agreement.
- the user 102 can "activate” the access credential to access an application to view rental property information but is unable to "enable” the access credential to obtain access to the property 101 as described above.
- the access credential is distributed only after the user 140 has formed a rental agreement with the property administrator 104 to rent the property 101 over a rental period.
- the user 102 can "activate” the access credential to view property information on the application, and then “enable” the access credential to gain access to the property 101 at the start of his/her rental period under the rental agreement.
- the process 700 can include the operation of receiving access data indicating a submitted access credential (730). For instance, once the access credential has been distributed to the user 102, the application server 130 receives access data from the user device 140 indicating a submitted access credential. For example, as depicted in FIG. 6A, the submitted access credential can be provided through a login page of the application where the user 102 can submit the access credential that was previously distributed and/or other types of information.
- the access data includes other types of data in addition to the submitted access credential.
- the access data additionally includes location data indicating a present location of the user device 140 when the user provided the submitted access credential
- the access data can include user-specific information (e.g., external account information of the user for a rental property website) or property-specific information (e.g., a property identifier for the property 101). in such examples, the user-specific information and/or the property-specific information can be used to validate the received access data.
- the process 700 can include the operation of determining that the submitted access credential is valid (740).
- the application server 130 may determine that the submitted access credential is valid based on the access data received at step 730.
- the application sen ⁇ er 130 determines that the submitted access credential is valid based on determining that the submitted access credential matches the access credential that was distributed to the user device 140 at step 720.
- the application server 130 additionally, or alternatively, determines that the submitted access credential based on verifying the other information.
- application server 130 may verify location data of the user device 140 based on determining that the present location of the user device 140 is within a threshold proximity of the location of the property 101.
- the application server 130 may verify submitted user information included with the submitted access credential within the access data if the submitted user information matches a set of verified user information obtained from an external user account such as an existing user account with a rental listing website.
- the process 700 can include the operation of providing access to user interface enabling access to the property (750). For instance, in response to determining that the submitted access credential is valid, the application server 130 provides the user 102 with access to a user interface (e.g., the user interface 600B) enabling access to the property for the time period specified by the access credential. Access to the user interface can be provided through a mobile application, as depicted in FIG. 6B, or through a webpage portal, as described above.
- the user can, for example, view property information for the rental property or perform actions in association with the rental property such as unlocking an electronic lock for the property to obtain physical access to the property.
- a user can select a user interface element presented on the user interface that causes the user device 140 to transmit an indication to the application server 130 to relay an instruction to the unlock the electronic lock 128 and provide the user 102 with physical access to the property 101.
- the described systems, methods, and techniques may be implemented in digital electronic circuitry, computer hardware, firmware, software, or in combinations of these elements. Apparatus implementing these techniques may include appropriate input and output devices, a computer processor, and a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor. A process implementing these techniques may be performed by a programmable processor executing a program of instractions to perform desired functions by operating on input data and generating appropriate output.
- the techniques may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instractions from, and to transmit data and instractions to, a data storage system, at least one input device, and at least one output device.
- Each computer program may be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language may be a compiled or interpreted language.
- Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory.
- Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as Erasable Programmable Read-Only Memory (EPROM),
- EPROM Erasable Programmable Read-Only Memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- flash memory devices magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Any of the foregoing may be supplemented by, or incorporated in, specially designed application-specific integrated circuits (ASICs).
- ASICs application-specific integrated circuits
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2017286911A AU2017286911A1 (en) | 2016-06-30 | 2017-06-30 | Scheduled temporary rental property access |
EP17821363.3A EP3479307A4 (fr) | 2016-06-30 | 2017-06-30 | Accès programmé à une propriété de location temporaire |
CA3029585A CA3029585A1 (fr) | 2016-06-30 | 2017-06-30 | Acces programme a une propriete de location temporaire |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662356679P | 2016-06-30 | 2016-06-30 | |
US62/356,679 | 2016-06-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018005976A1 true WO2018005976A1 (fr) | 2018-01-04 |
Family
ID=60787626
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2017/040304 WO2018005976A1 (fr) | 2016-06-30 | 2017-06-30 | Accès programmé à une propriété de location temporaire |
Country Status (5)
Country | Link |
---|---|
US (2) | US10977583B2 (fr) |
EP (1) | EP3479307A4 (fr) |
AU (1) | AU2017286911A1 (fr) |
CA (1) | CA3029585A1 (fr) |
WO (1) | WO2018005976A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019191757A1 (fr) * | 2018-03-30 | 2019-10-03 | Trundle Steven | Système de surveillance destiné à surveiller des services laissés sans surveillance |
AU2017321747B2 (en) * | 2016-08-31 | 2023-06-29 | Zweispace Japan Corp. | Real estate management system, method, and program |
EP4088163A4 (fr) * | 2020-01-06 | 2023-07-05 | Alarm.com Incorporated | Qualité de connexion de réseau maillé |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200013291A1 (en) * | 2015-05-15 | 2020-01-09 | Pied Parker, Inc. | Systems and methods for wireless device detection |
WO2018005976A1 (fr) | 2016-06-30 | 2018-01-04 | Camargo Fabian Emilio Philipe | Accès programmé à une propriété de location temporaire |
US10360746B1 (en) | 2016-12-30 | 2019-07-23 | Alarm.Com Incorporated | Controlled indoor access using smart indoor door knobs |
CA3049726A1 (fr) | 2017-01-10 | 2018-07-19 | Babak Rezvani | Dispositif de guidage de drone d'urgence |
US10837782B1 (en) * | 2017-01-10 | 2020-11-17 | Alarm.Com Incorporated | Drone-guided property navigation techniques |
US11856938B1 (en) | 2017-03-31 | 2024-01-02 | Alarm.Com Incorporated | Robotic rover |
US11251955B2 (en) * | 2017-09-07 | 2022-02-15 | Arris Enterprises Llc | System and method for simplified wifi set up of client devices |
US10565856B2 (en) * | 2018-03-30 | 2020-02-18 | Tyco Safety Products Canada Ltd. | Alarm system for facilitating partial alarm system disabling during temporary premises access |
KR102661628B1 (ko) * | 2018-09-13 | 2024-05-02 | 삼성전자주식회사 | IoT 기기 제어 서비스를 제공하는 전자 장치 및 그 제어 방법 |
US20200126003A1 (en) * | 2018-10-22 | 2020-04-23 | Hilton International Holding Llc | Collective group of hotel rooms able to be selectively and serially linked by a customer |
US10991189B2 (en) | 2018-10-25 | 2021-04-27 | Myomega Systems Gmbh | Establishing control based on location of a mobile device |
US20210127275A1 (en) | 2018-10-25 | 2021-04-29 | Myomega Systems Gmbh | Access system |
CN110021092B (zh) * | 2018-10-29 | 2021-09-28 | 深圳市微开互联科技有限公司 | 一种基于openid的租客门禁权限控制方法 |
US10846958B2 (en) * | 2019-03-22 | 2020-11-24 | Eingot Llc | Virtual intercom system |
US11900744B2 (en) | 2019-03-22 | 2024-02-13 | Eingot Llc | Virtual intercom system |
US10685516B1 (en) | 2019-03-22 | 2020-06-16 | Eingot Llc | Virtual intercom system |
CN109917667B (zh) * | 2019-03-31 | 2021-06-22 | 广东美的制冷设备有限公司 | 家电设备及其控制权限分享方法、控制终端以及存储介质 |
US11423473B2 (en) * | 2019-04-10 | 2022-08-23 | Advanced New Technologies Co., Ltd. | Blockchain-based leasing |
US11455854B2 (en) * | 2019-05-29 | 2022-09-27 | Chirp Systems, Inc. | Access control for property management |
US11527147B2 (en) * | 2019-08-09 | 2022-12-13 | TeamOfDefenders LLC | Devices, systems, and methods for monitoring controlled spaces for transitory uses |
US11651456B1 (en) * | 2019-12-17 | 2023-05-16 | Ambarella International Lp | Rental property monitoring solution using computer vision and audio analytics to detect parties and pets while preserving renter privacy |
US11645706B1 (en) * | 2019-12-17 | 2023-05-09 | Ambarella International Lp | Generating detection parameters for a rental property monitoring solution using computer vision and audio analytics from a rental agreement |
US20210329447A1 (en) * | 2020-04-20 | 2021-10-21 | Guarded Horizons Inc. | System and method for operating a device |
EP4332920A1 (fr) * | 2022-08-30 | 2024-03-06 | dormakaba Schweiz AG | Procédés et dispositifs de gestion d'accès pour un bâtiment résidentiel géré |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140129113A1 (en) * | 2012-11-07 | 2014-05-08 | Ford Global Technologies, Llc | Hardware and controls for personal vehicle rental |
US20160080390A1 (en) * | 2014-09-12 | 2016-03-17 | StoryCloud, Inc. | Method and apparatus for network controlled ticket access |
US20160163138A1 (en) | 2014-12-05 | 2016-06-09 | Homeaway, Inc. | Application and platform for temporary control over property access functions |
Family Cites Families (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002008551A1 (fr) | 2000-07-20 | 2002-01-31 | Codesmart Access Systems Pty Ltd | Procede et systeme d'acces |
US6976269B1 (en) | 2000-08-29 | 2005-12-13 | Equinix, Inc. | Internet co-location facility security system |
CA2324679A1 (fr) | 2000-10-26 | 2002-04-26 | Lochisle Inc. | Methode et systeme de controle d'acces physique utlisant une connection sans fils a un reseau |
DK1336937T3 (da) | 2002-02-13 | 2004-09-27 | Swisscom Ag | Adgangskontrolsystem, adgangskontrolfremgangsmåde og dertil egnede indretninger |
US20040022422A1 (en) | 2002-08-02 | 2004-02-05 | Masaki Yamauchi | Authentication apparatus and authentication method |
JP2004102621A (ja) | 2002-09-09 | 2004-04-02 | Fujitsu Ltd | 宿泊予約装置、宿泊予約方法および宿泊予約プログラム |
US6985070B1 (en) | 2002-12-09 | 2006-01-10 | Sprint Communications Company L.P. | Biometric authentication of hospitality-site customers |
US8437740B2 (en) | 2003-02-21 | 2013-05-07 | Utc Fire & Security Americas Corporation, Inc. | Key control with real time communications to remote locations |
WO2004077848A2 (fr) | 2003-02-21 | 2004-09-10 | Ge Interlogix, Inc. | Commande de cle pour communications en temps reel vers des lieux distants |
US7209029B2 (en) * | 2004-06-01 | 2007-04-24 | Kaba Ilco, Inc. | Electronic lock system and method for providing access thereto |
US7734068B2 (en) | 2005-10-26 | 2010-06-08 | Sentrilock, Inc. | Electronic lock box using a biometric identification device |
CN101467185A (zh) | 2006-02-21 | 2009-06-24 | Adt安全服务公司 | 远程值班交货的系统和方法 |
US8902042B2 (en) | 2006-05-16 | 2014-12-02 | Lpd, L.L.C. | Methods of controlling access to real estate properties |
US8058971B2 (en) | 2006-06-07 | 2011-11-15 | Utc Fire & Security Americas Corporation, Inc. | Access control system |
US8451088B2 (en) | 2006-12-18 | 2013-05-28 | Sentrilock, Llc | Electronic lock box with transponder based communications |
US20080215384A1 (en) * | 2007-01-08 | 2008-09-04 | Mulholland Todd R | Negotiated Reservation for Vacation Rental Homes |
EP2428628B1 (fr) * | 2007-03-05 | 2018-11-28 | dormakaba Schweiz AG | Système pour le contrôle d'accès et dispositif de fermeture |
US20090030718A1 (en) | 2007-09-28 | 2009-01-29 | Rick Robert Bengson | System and method for automatic acquisition and distribution of information in a real estate context |
WO2009088901A1 (fr) | 2007-12-31 | 2009-07-16 | Schlage Lock Company | Procédé et système pour commander à distance un accès à un point d'accès |
US8035480B2 (en) | 2008-02-28 | 2011-10-11 | Showingtime.Com, Inc. | Showing management system to automatically match and control electronic lockboxes |
US8145352B2 (en) | 2008-02-28 | 2012-03-27 | Showingtime.Com, Inc. | Showing management system to automatically match and control electronic lockboxes |
US20090299777A1 (en) | 2008-05-30 | 2009-12-03 | Hersh Silberman | Hotel reservation system without check-in |
US20110082746A1 (en) | 2009-10-06 | 2011-04-07 | Christopher Rice | Systems and Methods for Providing Location Based Promotions and Feedback Services |
US8957757B1 (en) | 2010-10-28 | 2015-02-17 | Alarm.Com Incorporated | Access management and reporting technology |
CN103548060B (zh) * | 2011-02-28 | 2016-06-22 | 跃动有限公司 | 用于对电子锁的访问进行控制的系统和方法 |
US8688594B2 (en) | 2011-03-23 | 2014-04-01 | Bank Of America Corporation | Self-service home buying |
EP2689399B1 (fr) | 2011-03-24 | 2016-11-16 | Recludo AB | Dispositif et procédé de commande d'autorisation biométrique autonome |
EP2710562A1 (fr) | 2011-05-02 | 2014-03-26 | Apigy Inc. | Systèmes et procédés de commande d'un mécanisme de verrouillage à l'aide d'un dispositif électronique portable |
EP2584538B1 (fr) * | 2011-10-18 | 2017-07-12 | Axis AB | Appareil et procédé pour le contrôle d'accès |
US10325426B2 (en) | 2011-12-30 | 2019-06-18 | Consumer 2.0, Inc. | Automated entry |
WO2013126868A1 (fr) | 2012-02-23 | 2013-08-29 | Jadhav Ajay | Infrastructure d'un nœud persistant |
US9361771B2 (en) | 2012-05-23 | 2016-06-07 | Schlage Lock Company Llc | Door lock sensor and alarm |
US9161219B2 (en) | 2012-06-22 | 2015-10-13 | Guest Tek Interactive Entertainment Ltd. | Authorizing secured wireless access at hotspot having open wireless network and secure wireless network |
US9626841B2 (en) * | 2012-09-21 | 2017-04-18 | Google Inc. | Occupant notification of visitor interaction with a doorbell at a smart-home |
US9600645B2 (en) | 2012-09-21 | 2017-03-21 | Google Inc. | Smart invitation handling at a smart-home |
WO2014124529A1 (fr) | 2013-02-15 | 2014-08-21 | Keycafe Inc. | Procédés et systèmes de gestion d'échanges de clés |
US9563991B2 (en) | 2013-03-05 | 2017-02-07 | Apple Inc. | Dynamically authorizing access to restricted areas |
WO2014144628A2 (fr) | 2013-03-15 | 2014-09-18 | Master Lock Company | Caméras et système de sécurité en réseau et procédés |
US9437063B2 (en) | 2014-01-04 | 2016-09-06 | Latchable, Inc. | Methods and systems for multi-unit real estate management |
US20150193864A1 (en) * | 2014-01-06 | 2015-07-09 | Rentlever, Llc | Technologies for property management and rental |
US9923879B1 (en) * | 2014-01-16 | 2018-03-20 | Microstrategy Incorporated | Sharing keys |
US9444805B1 (en) * | 2014-01-27 | 2016-09-13 | Microstrategy Incorporated | Context-aware validation |
US20150230059A1 (en) | 2014-02-11 | 2015-08-13 | Kirk Damman | Motion State Notifying Device and Method |
US9996999B2 (en) | 2014-07-30 | 2018-06-12 | Master Lock Company Llc | Location tracking for locking device |
US20160048934A1 (en) | 2014-09-26 | 2016-02-18 | Real Data Guru, Inc. | Property Scoring System & Method |
CN105488607A (zh) * | 2014-10-13 | 2016-04-13 | 深圳市多度科技有限公司 | 一种基于物联网的智能社区运营平台 |
US10922642B2 (en) | 2014-11-04 | 2021-02-16 | Hall Labs Llc | System and method for linking an event to video documenting the event |
US9831724B2 (en) | 2014-12-02 | 2017-11-28 | Tyco Fire & Security Gmbh | Access control system using a wearable access sensory implementing an energy harvesting technique |
WO2016145168A1 (fr) * | 2015-03-10 | 2016-09-15 | Abb Technology Ag | Système et procédé pour administrer un accès de sécurité physique à des éléments d'un système de commande de traitement |
US10057227B1 (en) * | 2015-03-27 | 2018-08-21 | Amazon Technologies, Inc. | Determination of authentication mechanism |
US10490003B2 (en) * | 2015-12-31 | 2019-11-26 | Vivint, Inc. | Guest mode access |
US9710978B1 (en) | 2016-03-15 | 2017-07-18 | Tyco Fire & Security Gmbh | Access control system using optical communication protocol |
US9824559B2 (en) | 2016-04-07 | 2017-11-21 | Tyco Fire & Security Gmbh | Security sensing method and apparatus |
WO2018005976A1 (fr) | 2016-06-30 | 2018-01-04 | Camargo Fabian Emilio Philipe | Accès programmé à une propriété de location temporaire |
-
2017
- 2017-06-30 WO PCT/US2017/040304 patent/WO2018005976A1/fr unknown
- 2017-06-30 EP EP17821363.3A patent/EP3479307A4/fr not_active Ceased
- 2017-06-30 US US15/639,046 patent/US10977583B2/en active Active
- 2017-06-30 AU AU2017286911A patent/AU2017286911A1/en not_active Abandoned
- 2017-06-30 CA CA3029585A patent/CA3029585A1/fr active Pending
-
2021
- 2021-04-12 US US17/227,593 patent/US12118481B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140129113A1 (en) * | 2012-11-07 | 2014-05-08 | Ford Global Technologies, Llc | Hardware and controls for personal vehicle rental |
US20160080390A1 (en) * | 2014-09-12 | 2016-03-17 | StoryCloud, Inc. | Method and apparatus for network controlled ticket access |
US20160163138A1 (en) | 2014-12-05 | 2016-06-09 | Homeaway, Inc. | Application and platform for temporary control over property access functions |
Non-Patent Citations (1)
Title |
---|
See also references of EP3479307A4 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2017321747B2 (en) * | 2016-08-31 | 2023-06-29 | Zweispace Japan Corp. | Real estate management system, method, and program |
WO2019191757A1 (fr) * | 2018-03-30 | 2019-10-03 | Trundle Steven | Système de surveillance destiné à surveiller des services laissés sans surveillance |
US10748362B2 (en) | 2018-03-30 | 2020-08-18 | Alarm.Com Incorporated | Monitoring system for monitoring unattended services |
US10964140B2 (en) | 2018-03-30 | 2021-03-30 | Alarm.Com Incorporated | Monitoring system for monitoring unattended services |
EP4088163A4 (fr) * | 2020-01-06 | 2023-07-05 | Alarm.com Incorporated | Qualité de connexion de réseau maillé |
US12015939B2 (en) | 2020-01-06 | 2024-06-18 | Alarm.Com Incorporated | Mesh network connection quality |
Also Published As
Publication number | Publication date |
---|---|
US12118481B2 (en) | 2024-10-15 |
US20180005143A1 (en) | 2018-01-04 |
US20210232983A1 (en) | 2021-07-29 |
EP3479307A1 (fr) | 2019-05-08 |
US10977583B2 (en) | 2021-04-13 |
CA3029585A1 (fr) | 2018-01-04 |
EP3479307A4 (fr) | 2019-07-10 |
AU2017286911A1 (en) | 2019-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12118481B2 (en) | Scheduled temporary rental property access | |
US11501590B2 (en) | Authorized smart access to a monitored property | |
US11625965B2 (en) | Smart building integration and device hub | |
US11657666B2 (en) | Verified access to a monitored property | |
US9854386B2 (en) | Methods and apparatus for using smart environment devices via application program interfaces | |
US8854177B2 (en) | System, method and database for managing permissions to use physical devices and logical assets | |
US11606252B2 (en) | Wireless connection validation techniques | |
US20140019768A1 (en) | System and Method for Shunting Alarms Using Identifying Tokens | |
US11788844B2 (en) | Drone-guided property navigation techniques | |
US11949683B2 (en) | Guest access to control devices | |
US12067094B2 (en) | PIN verification | |
CN109923592A (zh) | 用于访问控制和觉察管理的方法和系统 | |
CN107578501A (zh) | 无线电子门锁系统 | |
TW202230269A (zh) | 智能住宿管理系統及其方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17821363 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3029585 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2017286911 Country of ref document: AU Date of ref document: 20170630 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017821363 Country of ref document: EP Effective date: 20190130 |